Vulnerability CVE-2018-1063


Published: 2018-03-02

Description:
Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.

Type:

CWE-59

(Improper Link Resolution Before File Access ('Link Following'))

CVSS2 => (AV:L/AC:M/Au:N/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
3.3/10
4.9/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None
Affected software
Selinux project -> Selinux 
Redhat -> Enterprise linux 

 References:
https://access.redhat.com/errata/RHSA-2018:0913
https://bugzilla.redhat.com/show_bug.cgi?id=1550122

Copyright 2024, cxsecurity.com

 

Back to Top